检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:Yu Han Tiantian Ji Zhongru Wang Hao Liu Hai Jiang Wendi Wang Xiang Cui
机构地区:[1]Key Laboratory of Trustworthy Distributed Computing and Service(BUPT),Ministry of Education,Beijing University of Posts and Telecommunications,Beijing,100876,China [2]Chinese Academy of Cyberspace Studies,Beijing,100010,China [3]Qianxin Technology Group Co.,Ltd.,Beijing,100088,China [4]Beijing DigApis Technology Co.,Ltd.,Beijing,100081,China [5]Cyberspace Institute of Advanced Technology,Guangzhou University,Guangzhou,510006,China
出 处:《Computer Modeling in Engineering & Sciences》2021年第7期247-267,共21页工程与科学中的计算机建模(英文)
基 金:This work was supported by the Guangdong Province Key Field Research and Development Program under Nos.2019B010137003 and 2019B010136004;the National Key Research and Development Program under Grant Nos.2018YFB0803504 and 2019YFA0706404.
摘 要:A smart contract honeypot is a special type of smart contract.This type of contract seems to have obvious vulnerabilities in contract design.If a user transfers a certain amount of funds to the contract,then the user can withdraw the funds in the contract.However,once users try to take advantage of this seemingly obvious vulnerability,they will fall into a real trap.Consequently,the user’s investment in the contract cannot be retrieved.The honeypot induces other accounts to launch funds,which seriously threatens the security of property on the blockchain.Detection methods for honeypots are available.However,studying the manner by which to defend existing honeypots is insufficient to fight against honeypots.The new honeypots that may appear in the future from the perspective of an attacker must also be predicted.Therefore,we propose a type of adversarial honeypot.The code and behavioral features of honeypots are obtained through a comparative analysis of the 158,568 nonhoneypots and 352 honeypots.To build an adversarial honeypot,we try to separately hide these features and make the honeypot bypass the existing detection technology.We construct 18 instances on the basis of the proposed adversarial honeypot and use an open-source honeypot detection tool to detect these instances.The experimental result shows that the proposed honeypot can bypass the detection tool with a 100%ratio.Therefore,this type of honeypot should be given attention,and defensive measures should be proposed as soon as possible.
关 键 词:HONEYPOT smart contract adversarial bypass detection
分 类 号:TN9[电子电信—信息与通信工程]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:18.217.252.20